Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Multi-Dimensional Trustworthiness for Grid Workflows., , and . DELOS, page 195-204. Edizioni Libreria Progetto, Padova, (2004)Preventing velocity-based linkage attacks in location-aware applications., , , and . GIS, page 246-255. ACM, (2009)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , and . TrustCom/BigDataSE/ISPA (1), page 718-725. IEEE, (2015)A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations., , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 368-384. Springer, (2010)On the Impact of Generative Policies on Security Metrics., , , and . SMARTCOMP, page 104-109. IEEE, (2019)Adaptive Management of Multigranular Spatio-Temporal Object Attributes., , , and . SSTD, volume 5644 of Lecture Notes in Computer Science, page 320-337. Springer, (2009)Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies., , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 386-397. Springer, (2007)Elite size and resilience impact on global system structuration in social media., , , , , and . CTS, page 9-10. IEEE, (2014)Fine-grained analysis of packet losses in wireless sensor networks., , and . SECON, page 320-328. IEEE, (2014)Multimedia Data Handling in a Knowledge Representation System., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 133-141. World Scientific, Singapore, (1992)